Academic literature on the topic 'Data and information privacy'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Data and information privacy.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Data and information privacy"
Fletcher, Sam, and Md Zahidul Islam. "Measuring Information Quality for Privacy Preserving Data Mining." International Journal of Computer Theory and Engineering 7, no. 1 (2014): 21–28. http://dx.doi.org/10.7763/ijcte.2015.v7.924.
Full textGertner, Yael, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. "Protecting Data Privacy in Private Information Retrieval Schemes." Journal of Computer and System Sciences 60, no. 3 (2000): 592–629. http://dx.doi.org/10.1006/jcss.1999.1689.
Full textMihai Yiannaki, Simona, Lucia Gibilaro, and Gianluca Mattarocci. "Big data firms and information privacy." Global Business and Economics Review 25, no. 3/4 (2021): 355. http://dx.doi.org/10.1504/gber.2021.10042256.
Full textYiannaki, Simona Mihai, Lucia Gibilaro, and Gianluca Mattarocci. "Big data firms and information privacy." Global Business and Economics Review 25, no. 3/4 (2021): 355. http://dx.doi.org/10.1504/gber.2021.118713.
Full textAnderson, R. "Undermining data privacy in health information." BMJ 322, no. 7284 (2001): 442–43. http://dx.doi.org/10.1136/bmj.322.7284.442.
Full textSuleiman, James, and Terry Huston. "Data Privacy and Security." International Journal of Information Security and Privacy 3, no. 2 (2009): 42–53. http://dx.doi.org/10.4018/jisp.2009040103.
Full textWhite, Garry L., Francis A. Méndez Mediavilla, and Jaymeen R. Shah. "Information Privacy." International Journal of Information Security and Privacy 5, no. 1 (2011): 50–66. http://dx.doi.org/10.4018/jisp.2011010104.
Full textAgrawal, Rakesh, and Ramakrishnan Srikant. "Privacy-preserving data mining." ACM SIGMOD Record 29, no. 2 (2000): 439–50. http://dx.doi.org/10.1145/335191.335438.
Full textWang, Ting, and Ling Liu. "Output privacy in data mining." ACM Transactions on Database Systems 36, no. 1 (2011): 1–34. http://dx.doi.org/10.1145/1929934.1929935.
Full textHu, Haibo, Jianliang Xu, Sai Tung On, Jing Du, and Joseph Kee-Yin Ng. "Privacy-aware location data publishing." ACM Transactions on Database Systems 35, no. 3 (2010): 1–42. http://dx.doi.org/10.1145/1806907.1806910.
Full textDissertations / Theses on the topic "Data and information privacy"
Aron, Yotam. "Information privacy for linked data." Thesis, Massachusetts Institute of Technology, 2013. http://hdl.handle.net/1721.1/85215.
Full textEl-Sheikh, Mahmoud Mohamed Omar. "Developing a Libyan information privacy framework." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/65866/1/Mahmoud%20Mohamed%20Omar_El-Sheikh_Thesis.pdf.
Full textAn, Nan. "Protect Data Privacy in E-Healthcare in Sweden." Thesis, Växjö University, School of Mathematics and Systems Engineering, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:vxu:diva-1619.
Full textSang, Lin. "Social Big Data and Privacy Awareness." Thesis, Uppsala universitet, Institutionen för informatik och media, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-242444.
Full textZheng, Yao. "Privacy Preservation for Cloud-Based Data Sharing and Data Analytics." Diss., Virginia Tech, 2016. http://hdl.handle.net/10919/73796.
Full textSivakumar, Anusha. "Enhancing Privacy Of Data Through Anonymization." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2014. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177349.
Full textSmith, Tanshanika Turner. "Examining Data Privacy Breaches in Healthcare." ScholarWorks, 2016. https://scholarworks.waldenu.edu/dissertations/2623.
Full textKatsikouli, Panagiota. "Distributed and privacy preserving algorithms for mobility information processing." Thesis, University of Edinburgh, 2018. http://hdl.handle.net/1842/31110.
Full textGonçalves, João Miguel Ribeiro. "Context-awareness privacy in data communications." Doctoral thesis, Universidade de Aveiro, 2015. http://hdl.handle.net/10773/15760.
Full textDayarathna, Rasika. "Discovering Constructs and Dimensions for Information Privacy Metrics." Doctoral thesis, Stockholms universitet, Institutionen för data- och systemvetenskap, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-89336.
Full textBooks on the topic "Data and information privacy"
1959-, Schwartz Paul M., ed. Information privacy law. 4th ed. Wolters Kluwer Law & Business, 2011.
Find full text1959-, Schwartz Paul M., ed. Privacy, information, and technology. 3rd ed. Wolters Kluwer Law & Business, 2011.
Find full text1959-, Schwartz Paul M., ed. Privacy, information, and technology. 2nd ed. Aspen Publishers, 2008.
Find full textMarc, Rotenberg, and Schwartz Paul M. 1959-, eds. Information privacy law. 2nd ed. Aspen Publishers, 2005.
Find full text1959-, Schwartz Paul M., ed. Information privacy law. 3rd ed. Aspen Publishers, 2008.
Find full textSol, Bermann, and International Association of Privacy Professionals, eds. Information privacy: Official reference for the Certified Information Privacy Professional (CIPP). International Association of Privacy Professionals, 2007.
Find full textBook chapters on the topic "Data and information privacy"
Zhang, Rui. "Acquiring Key Privacy from Data Privacy." In Information Security and Cryptology. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21518-6_25.
Full textNwankwo, Iheanyi Samuel. "Information Privacy in Nigeria." In African Data Privacy Laws. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-47317-8_3.
Full textHill, Dalvin, Joseph Walker, and John Hale. "Privacy Considerations for Health Information Exchanges." In Medical Data Privacy Handbook. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23633-9_12.
Full textDe Capitani di Vimercati, Sabrina, and Pierangela Samarati. "Data Privacy – Problems and Solutions." In Information Systems Security. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-77086-2_14.
Full textGritti, Clémentine, Willy Susilo, and Thomas Plantard. "Efficient Dynamic Provable Data Possession with Public Verifiability and Data Privacy." In Information Security and Privacy. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-19962-7_23.
Full textBennett, Krista, Christian Grothoff, Tzvetan Horozov, and Ioana Patrascu. "Efficient Sharing of Encrypted Data." In Information Security and Privacy. Springer Berlin Heidelberg, 2002. http://dx.doi.org/10.1007/3-540-45450-0_8.
Full textDe Capitani di Vimercati, Sabrina, and Sara Foresti. "Privacy of Outsourced Data." In IFIP Advances in Information and Communication Technology. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14282-6_14.
Full textEdwards, Chris, and Nigel Savage. "Data Privacy: the UK Experience." In Information Technology & The Law. Palgrave Macmillan UK, 1990. http://dx.doi.org/10.1007/978-1-349-11768-0_5.
Full textEdwards, Chris, and Nigel Savage. "Data Privacy: The Uk Experience." In Information Technology & The Law. Macmillan Education UK, 1986. http://dx.doi.org/10.1007/978-1-349-08652-8_5.
Full textLiang, Kaitai, Atsuko Miyaji, and Chunhua Su. "Secure and Traceable Framework for Data Circulation." In Information Security and Privacy. Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-40253-6_23.
Full textConference papers on the topic "Data and information privacy"
Gertner, Yael, Yuval Ishai, Eyal Kushilevitz, and Tal Malkin. "Protecting data privacy in private information retrieval schemes." In the thirtieth annual ACM symposium. ACM Press, 1998. http://dx.doi.org/10.1145/276698.276723.
Full textKhoshgozaran, Ali, Houtan Shirani-Mehr, and Cyrus Shahabi. "SPIRAL: A Scalable Private Information Retrieval Approach to Location Privacy." In 2008 Ninth International Conference on Mobile Data Management Workshops, MDMW. IEEE, 2008. http://dx.doi.org/10.1109/mdmw.2008.23.
Full textSrinivasan, S. "Privacy Protection and Data Breaches." In InSITE 2015: Informing Science + IT Education Conferences: USA. Informing Science Institute, 2015. http://dx.doi.org/10.28945/2261.
Full textNcube, Tyron, Nomusa Dlodlo, and Alfredo Terzoli. "Private Blockchain Networks: A Solution for Data Privacy." In 2020 2nd International Multidisciplinary Information Technology and Engineering Conference (IMITEC). IEEE, 2020. http://dx.doi.org/10.1109/imitec50163.2020.9334132.
Full textOlawoyin, Anifat M., Carson K. Leung, and Alfredo Cuzzocrea. "Privacy-Preserving Publishing and Visualization of Spatial-Temporal Information." In 2021 IEEE International Conference on Big Data (Big Data). IEEE, 2021. http://dx.doi.org/10.1109/bigdata52589.2021.9671564.
Full textFleury-Charles, Aaron, Md Minhaz Chowdhury, and Nafiz Rifat. "Data Breaches: Vulnerable Privacy." In 2022 IEEE International Conference on Electro Information Technology (eIT). IEEE, 2022. http://dx.doi.org/10.1109/eit53891.2022.9814044.
Full textHui Yang, Grace, and Sicong Zhang. "Differential Privacy for Information Retrieval." In WSDM 2018: The Eleventh ACM International Conference on Web Search and Data Mining. ACM, 2018. http://dx.doi.org/10.1145/3159652.3162006.
Full textSkinner, G., Song Han, and E. Chang. "Defining and Protecting Meta Privacy: A New Conceptual Framework Within Information Privacy." In 22nd International Conference on Data Engineering Workshops (ICDEW'06). IEEE, 2006. http://dx.doi.org/10.1109/icdew.2006.46.
Full textXia, Weiyi, Murat Kantarcioglu, Zhiyu Wan, Raymond Heatherly, Yevgeniy Vorobeychik, and Bradley Malin. "Process-Driven Data Privacy." In CIKM'15: 24th ACM International Conference on Information and Knowledge Management. ACM, 2015. http://dx.doi.org/10.1145/2806416.2806580.
Full textChaves, Iago, and Javam Machado. "Differentially Private Group-by Data Releasing Algorithm." In XXXIV Simpósio Brasileiro de Banco de Dados. Sociedade Brasileira de Computação - SBC, 2019. http://dx.doi.org/10.5753/sbbd.2019.8835.
Full textReports on the topic "Data and information privacy"
Soderberg, Eric, and William Glenney. Data Mining and Information Technology: Its Impact on Intelligence Collection and Privacy Rights. Defense Technical Information Center, 2007. http://dx.doi.org/10.21236/ada475402.
Full textGreen, S., K. Ozawa, and A. Katsnelson. Management Information Base for Data Over Cable Service Interface Specification (DOCSIS) Cable Modems and Cable Modem Termination Systems for Baseline Privacy Plus. Edited by E. Cardona. RFC Editor, 2005. http://dx.doi.org/10.17487/rfc4131.
Full textRannenberg, Kai, Sebastian Pape, Frédéric Tronnier, and Sascha Löbner. Study on the Technical Evaluation of De-Identification Procedures for Personal Data in the Automotive Sector. Universitätsbibliothek Johann Christian Senckenberg, 2021. http://dx.doi.org/10.21248/gups.63413.
Full textPopovic, Ales, H. Jeff Smith, James Y. L. Thong, and Sunil Wattal. Information Privacy. MIS Quarterly, 2017. http://dx.doi.org/10.25300/misq/2019/curations/05292017.
Full textChinn, Menzie, and Michael Moore. Private Information and a Macro Model of Exchange Rates: Evidence from a Novel Data Set. National Bureau of Economic Research, 2008. http://dx.doi.org/10.3386/w14175.
Full textLiu, Zhuang, Michael Sockin, and Wei Xiong. Data Privacy and Temptation. National Bureau of Economic Research, 2020. http://dx.doi.org/10.3386/w27653.
Full textZhan, Zhijun, and LiWu Chang. Privacy-Preserving Collaborative Data Mining. Defense Technical Information Center, 2003. http://dx.doi.org/10.21236/ada464602.
Full textHeffetz, Ori, and Katrina Ligett. Privacy and Data-Based Research. National Bureau of Economic Research, 2013. http://dx.doi.org/10.3386/w19433.
Full textMathew, Jijo K., Christopher M. Day, Howell Li, and Darcy M. Bullock. Curating Automatic Vehicle Location Data to Compare the Performance of Outlier Filtering Methods. Purdue University, 2021. http://dx.doi.org/10.5703/1288284317435.
Full textSoenen, Karen, Dana Gerlach, Christina Haskins, et al. How can BCO-DMO help with your oceanographic data? How can BCO-DMO help with your oceanographic data?, 2021. http://dx.doi.org/10.1575/1912/27803.
Full text